Smartphone Forensics: A Proactive Investigation Scheme for Evidence Acquisition

Smartphones constantly interweave into everyday life, as they accompany individuals in different contexts. Smartphones include a combination of heterogeneous data sources, which can prove essential when combating crime. In this paper we examine potential evidence that may be collected from smartphones. We also examine the available connection channels for evidence transfer during a forensic investigation. We propose a Proactive Smartphone Investigation Scheme that focuses on ad hoc acquisition of smartphone evidence. We also, take into consideration the legal implications of the proposed scheme, as it is essential that the scheme includes prevention mechanisms, so as to protect individuals from misuse by investigators or malicious entities.

[1]  Sebastiaan H. von Solms,et al.  A Multi-component View of Digital Forensics , 2010, 2010 International Conference on Availability, Reliability and Security.

[2]  Lilian Mitrou,et al.  Communications Data Retention: A Pandora’s Box for Rights and Liberties? , 2007 .

[3]  Clive Blackwell An Investigative Framework for Incident Analysis , 2011, IFIP Int. Conf. Digital Forensics.

[4]  Vrizlynn L. L. Thing,et al.  Live memory forensics of mobile phones , 2010, Digit. Investig..

[5]  Brian Neil Levine,et al.  Forensic Triage for Mobile Phones with DEC0DE , 2011, USENIX Security Symposium.

[6]  Marcus K. Rogers,et al.  Computer Forensics Field Triage Process Model , 2006, J. Digit. Forensics Secur. Law.

[7]  Wiebke Abel Agents, Trojans and tags: The next generation of investigators , 2009 .

[8]  Farkhund Iqbal,et al.  Speaker verification from partially encrypted compressed speech for forensic investigation , 2010, Digit. Investig..

[9]  Gary C. Kessler,et al.  The growing need for on-scene triage of mobile devices , 2010, Digit. Investig..

[10]  Ricci S. C. Ieong,et al.  FORZA - Digital forensics investigation framework that incorporate legal issues , 2006, Digit. Investig..

[11]  Emiliano Miluzzo,et al.  A survey of mobile phone sensing , 2010, IEEE Communications Magazine.

[12]  Sean Morrissey,et al.  iOS Forensic Analysis: for iPhone, iPad, and iPod touch , 2010 .

[13]  Wayne Jansen,et al.  Guidelines on Cell Phone Forensics , 2007 .

[14]  Ian Brown Regulation of converged communications surveillance , 2008 .

[15]  Adam M. Gershowitz The iPhone Meets the Fourth Amendment , 2008 .

[16]  Andreas Wiebe The new fundamental right to it security — First evaluation and comparative view at the U.S. , 2008, Datenschutz und Datensicherheit - DuD.

[17]  John A. Zachman,et al.  A Framework for Information Systems Architecture , 1987, IBM Syst. J..

[18]  Theodore Tryfonas,et al.  Acquiring volatile operating system data tools and techniques , 2008, OPSR.